Skip to main content

Home/ Digiteen/ Group items tagged general

Rss Feed Group items tagged

Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Jerilyn J

5DT Virtual Reality Information - 0 views

  • What is Virtual Reality (VR)? Virtual Reality is generally a Computer Generated (CG) environment that makes the user think that he/she is in the real environment. One may also experience a virtual reality by simply imagining it, like Alice in Wonderland, but we will focus on computer generated virtual realities for this discussion.
  • Applications of Virtual Reality (VR) Virtual Reality is an ideal training and visualization medium.
  • What is Virtual Reality (VR)? Virtual Reality is generally a Computer Generated (CG) environment that makes the user think that he/she is in the real environment. One may also experience a virtual reality by simply imagining it, like Alice in Wonderland, but we will focus on computer generated virtual realities for this discussion.
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Julie Lindsay

Is this the dumbest generation? - grownupdigital - 0 views

  •  
    Don Tapscott outlines many of the inaccurate, yet unfortunately popular, stereotypes of the Net Generation in Grown Up Digital. What is your reaction to the negative characterization of youth today?
William B

Help Protect Your Child's Online Reputation From Damage | Safetyweb - 0 views

  • Nearly every study performed on the topic has found not only a direct correlation between age and Internet addiction, but also one between age and neglect of work. That is to say that teenagers and young adults are more likely to be addicted to the Internet than any other age group, and among all people suffering from this addiction, teenagers and young adults are more likely to neglect work (school or employment) than older adults with similar addictive behavior. In fact, in the most widely recognized study of its kind, age was the only factor that was a direct and constant contributor to this addiction across all other factors.[1] While this may be good news, suggesting that teenagers and young adults might grow out of their addiction (or reduce their intake) as they age, because this is a new "genre" of behavior, this data might simply reveal that teenagers and young adults are "early adapters." What this means, essentially, is that they may have found this addiction before the rest of the population. If this is the case, today's Internet-Addicted teenagers and young adults may carry it with them into adulthood. In fact, Stanford University's School of Medicine found that nearly one in eight Americans suffers from at least one sign of problematic Internet abuse (although this does not in and of itself constitute addiction).[2] Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental Disorders), which is published by the American Psychiatric Association, is reported to be considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia and borderline personality disorders.[3] Indeed, as children and teenagers are still developing their brains, they may grow accustomed to the speed and flashy graphics associated with the Internet and actually adapt their physiology, developing problems such as ADHD, and becoming generally more impatient than people raised without the instant gratification offered by the Internet
  •  
    Internet addiction is one of the main addictions. Many people are addicted to the Internet. Many people need to learn not to be addicted to the Internet cause it is a bad for your health. "Nearly every study performed on the topic has found not only a direct correlation between age and Internet addiction, but also one between age and neglect of work. That is to say that teenagers and young adults are more likely to be addicted to the Internet than any other age group, and among all people suffering from this addiction, teenagers and young adults are more likely to neglect work (school or employment) than older adults with similar addictive behavior. In fact, in the most widely recognized study of its kind, age was the only factor that was a direct and constant contributor to this addiction across all other factors.[1] While this may be good news, suggesting that teenagers and young adults might grow out of their addiction (or reduce their intake) as they age, because this is a new "genre" of behavior, this data might simply reveal that teenagers and young adults are "early adapters." What this means, essentially, is that they may have found this addiction before the rest of the population. If this is the case, today's Internet-Addicted teenagers and young adults may carry it with them into adulthood. In fact, Stanford University's School of Medicine found that nearly one in eight Americans suffers from at least one sign of problematic Internet abuse (although this does not in and of itself constitute addiction).[2] Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental Disorders), which is published by the American Psychiatric Association, is reported to be considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia and borderline personality disorders.[3] Indeed, as children and teenagers are still developing their brains, they may grow accustomed to the speed and flashy graphics associate
Julie Lindsay

The Tell-All Generation Learns When Not To, at Least Online - NYTimes.com - 0 views

  •  
    "The conventional wisdom suggests that everyone under 30 is comfortable revealing every facet of their lives online, from their favorite pizza to most frequent sexual partners. But many members of the tell-all generation are rethinking what it means to live out loud. "
Steve Madsen

The Technology Generation Gap at Work is Oh So Wide - ReadWriteWeb - 0 views

  •  
    Article could provide some ideas for the Digiteen project.
  •  
    The generation gap at work is really wide with vast discrepancies when it comes to what the appropriate use of technology is - a problem that leads to increasing tensions in the workplace.
anonymous

HowStuffWorks "How Net Generation Students Learn and Work" - 0 views

  • The Net Generation quickly shifts attention from one project to the next, always putting a high priority on speed. Sometimes that speed comes at a cost
  •  
    Speed Article
Ivy F.

Shaping Youth » Grown Up Digital: Don Tapscott's Latest On 'Generation Net' - 0 views

  • hat digital premise opens up the debate for the 21st century tug-o-war of perception between what Wikinomics author Don Tapscott of Grown Up Digital calls the ‘smartest generation’ and what his nemesis, Mark Bauerlein of Emery College calls “The Dumbest Generation” in his recent book by the same name.
Vicki Davis

Can the law keep up with technology? - CNN.com - 2 views

  • Love posted allegedly derogatory and false comments about the designer -- among them that she had a "history of dealing cocaine" -- on her now-discontinued Twitter feed.
  • it's typically difficult to predict or anticipate technology innovations.
  • Is the Web a unique, separate space or is it really an extension of real space?
  • ...7 more annotations...
  • "We really haven't thought about this much because there haven't been many generations of users with copious digital assets to even trigger the need to think about what happens if they pass away," Matwyshyn said.
  • the school provided alternative reasons for denying Snyder a degree
  • Cohen sued Google to learn the name of the anonymous blogger on the grounds that the post was defamatory and libelous. A New York Supreme Court judge ordered Google to reveal the anonymous blogger's name, and Google complied.
  • In 2006, Stacy Snyder was a 25-year-old single mother hoping to begin a career as an educator. She had finished her coursework and was a student teacher. Yet Millersville University, located in Pennsylvania, wouldn't give her a degree.
  • The case provided insight into the debate between the competing values of privacy and free speech, said Jeffrey Toobin, CNN's senior legal analyst.
  • "It can't take the place of good manners, social norms and etiquette -- the kind of thing that has always governed negotiations about face-to-face behavior.
  • "We should never expect that the judges are going to save us from our own worst impulses."
  •  
    An excellent article to make the case for digital citizenship education, I love the quote at the end that the law "can't take the place of good manners, social norms, and etiquette." Do we think that students just develop good manners on their own? Perhaps manners, norms, and etiquette would much better evolve with multiple generations and ages working together as we discuss and grapple with such issues. This is another excellent article about the changing state of the law and the Internet and includes the precedent that anonymous doesn't really mean anonymous any more - particularly if the anonymous person breaks the law.
  •  
    Excellent article about the changing legal issues of the Internet.
Merritt D

Attorney General Talks Online Safety With Students - Local News Story - KIFI Idaho Falls - 0 views

  •  
    Attorney General Talks to Middle School and High School students about online safety and sends home a DVD to take home to their parents to help guide them to social media and Internet lingo dictionary to help protect their children form online predators. Quote: "We live in a digital age. There are things facing our children/students that give them a lot more opportunities as well as a lot more challenges that they have to be prepared to deal with,"**and parents need to be prepared as well to be able to better protect their children*** Jefferson County Superintendent Dr. Ron Tolman said. ***add by me***
Morgan G

Cultural literacy - Wikipedia, the free encyclopedia - 0 views

  •  
    Cultural literacy is important because you need to know the importance of getting along with different cultures. Anyone can join social networks, so you need to learn how you can get along with everyone. "Cultural literacy is familiarity with and ability to understand the idioms, allusions, and informal content that create and constitute a dominant culture. From being familiar with street signs to knowing historical references to understanding the most recent slang, literacy demands interaction with the culture and reflection of it. Knowledge of a canonical set of literature is not sufficient in and of itself when engaging with others in a society, as life is interwoven with art, expression, history, and experience. Cultural literacy requires familiarity with a broad range of general knowledge and implies the use of that knowledge in the creation of a communal language and collective knowledge. Cultural literacy stresses the knowledge of those pieces of information that content creators will assume the audience already possesses."
Morgan G

How do people who are from different cultures live and get along with each other in NYC - 0 views

  •  
    The thing that stood out to me the most here, is the word respect. Everyone should have respect for different cultures online. Having respect can get you a long ways in life. "The best way I would believe would be open communication, respect for others beliefs, ethnicity, privacy, and the rights of an individual in general. An action of one person can make a negative or positive impact on society as a whole. If someone chooses to belittle another for something as serious as their beliefs or as trivial as the way they dress, they set in motion negative responses which will inevitably affect many others"
October H

Spyware, Trojans, Hackers & other PC Threats | Comodo - 0 views

  •  
    Online shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity theft than ever before."
  •  
    This is about how hackers can know where you live, what your banking is done, etc. All this is found by using Trojans,Hackers, and Spyware.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Woody H

For minorities, new 'digital divide' seen - USATODAY.com - 0 views

  •  
    it tells what race is more likely to use the internet. "latinos and blacks are more likely to access the web by cellular phones than the general public"
Julie Lindsay

Media and Health Studies, Reports & Research - Kaiser Family Foundation - 1 views

  •  
    Report January 2010 - Generation M2: Media in the Lives of 8-18 Year Olds
Miller S.

Hacker (computer security) - Wikipedia, the free encyclopedia - 0 views

  •  
    In common usage, hacker is generic term for a computer criminal, often with a specific specialty in computer intrusion.[1] While other definitions peculiar to the computer enthusiast community exist, they are rarely used in mainstream context. Computer hacking subculture is often referred to as the network hacker subculture or simply the computer underground.[citation needed] According to its adherents, cultural values center around the idea of creative and extraordinary computer usage.[citation needed] Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[citation needed]
Becca B

Why is Netiquette Important? | Why - 0 views

  • DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude.
  • Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone.
  • The very basic rule in Netiquette is thinking before posting.
  • ...1 more annotation...
  • Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad); Share 
  •  
    "Why is Netiquette Important? The internet is now a medium of communication for most people nowadays. Everything from business transactions, buying and selling, socializing or simply blogging your thoughts are conducted over the internet. Net etiquette is a fusion of the internet and good manners in cyberspace. Though nothing is really concrete in cyberspace it is important to bear in mind that the internet involves millions of people. It is like a world in a gadget, but the people you are dealing with on the other end are real and not mere avatars. Our generation now lives in the internet; there are formalities and guidelines to follow to render professionalism, courtesy, and order making the internet more useful and effective as possible. The very basic rule in Netiquette is thinking before posting. Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone. Unsolicited messages are spam and detested by everyone. Chain letters can be one example; it would be best to delete it and not forward it. Be careful when spreading warnings about Internet viruses sometimes it may just be a hoax. Many get fooled by this and immediately copy paste and send it to everyone in their mail list. You may end up getting a lot of junk mail or spam in the process. DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude. Lessen the use of acronyms, BRB for “be right back” and etc. Not everyone is familiar with this internet lingo. Acronyms may be ideal in the chat room but unprofessional in email. Make use of the FAQ, Frequently Asked Questions, it is a form of orientation for news groups and social networks. Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. Share "
1 - 20 of 66 Next › Last »
Showing 20 items per page